Sciweavers

4330 search results - page 5 / 866
» Analyzing security architectures
Sort
View
HICSS
2009
IEEE
128views Biometrics» more  HICSS 2009»
13 years 10 months ago
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models
To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after potential investments. This...
Teodor Sommestad, Mathias Ekstedt, Pontus Johnson
BROADNETS
2006
IEEE
14 years 23 days ago
Securing Sensor Networks Using A Novel Multi-Channel Architecture
— In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secre...
Chao Gui, Ashima Gupta, Prasant Mohapatra
SKG
2006
IEEE
14 years 21 days ago
Multi-layer Grid Portal Architecture Based on Mobile Agent
Many Grid portal architectures have three layers: browser, portal and Grid environment. We design a multi-layer Grid portal architecture, which introduced Mobile Agent; the mobile...
Fang Juan
LADC
2007
Springer
14 years 25 days ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
MDM
2007
Springer
154views Communications» more  MDM 2007»
14 years 25 days ago
Analysis of Security and Privacy Issues in RFID-Based Reference Point Systems
In this paper, we analyze security and privacy issues in RFID-based reference point systems, which seamlessly provide high resolution location information so as to enable innovati...
Oranat Sangratanachaikul, Leping Huang, Shin'ichi ...